A hierarchical key management and authentication method for wireless sensor networks
Summary In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these n...
Gespeichert in:
Veröffentlicht in: | International journal of communication systems 2022-04, Vol.35 (6), p.n/a |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | n/a |
---|---|
container_issue | 6 |
container_start_page | |
container_title | International journal of communication systems |
container_volume | 35 |
creator | Alimoradi, Pourya Barati, Ali Barati, Hamid |
description | Summary
In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these networks, maintaining security has always been one of the most critical challenges in wireless sensor networks. Key management is one of the methods used to maintain security in wireless sensor networks. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication. The performance of the proposed method is compared with the Zhang et al. (2016); the EDAK (Athmani et al., 2019), DKMS (Yousefpoor & Barati, 2020), SSEKMS (Kumar et al., 2021), and ADPK (Ahlawat & Dave, 2021) methods show the proposed method's better performance.
In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication. |
doi_str_mv | 10.1002/dac.5076 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2637880978</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2637880978</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2936-fcb7430bb2791fe47ceea66e6d1bc664cf37f156cef9c11397b24c9083438f143</originalsourceid><addsrcrecordid>eNp1kMFOwzAMhiMEEmMg8QiRuHDpSJo0aY7TYIA0ics4R2nq0G5tM5JO096ejHHl5N_yJ1v-ELqnZEYJyZ9qY2cFkeICTShRKqOU0ctTljwrWEGv0U2MG0JImYtigtZz3LQQTLBNa02Ht3DEvRnMF_QwjNgMNTb7sUk5jcfWD7iHsfE1dj7gQxuggxhxhCGmfoDx4MM23qIrZ7oId391ij6XL-vFW7b6eH1fzFeZzRUTmbOV5IxUVS4VdcClBTBCgKhpZYXg1jHpaCEsOGXTH0pWObeKlIyz0lHOpujhvHcX_Pce4qg3fh-GdFLngsmyJEqWiXo8Uzb4GAM4vQttb8JRU6JPznRypk_OEpqd0UPbwfFfTj_PF7_8D3AHbZ4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2637880978</pqid></control><display><type>article</type><title>A hierarchical key management and authentication method for wireless sensor networks</title><source>Wiley-Blackwell Journals</source><creator>Alimoradi, Pourya ; Barati, Ali ; Barati, Hamid</creator><creatorcontrib>Alimoradi, Pourya ; Barati, Ali ; Barati, Hamid</creatorcontrib><description>Summary
In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these networks, maintaining security has always been one of the most critical challenges in wireless sensor networks. Key management is one of the methods used to maintain security in wireless sensor networks. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication. The performance of the proposed method is compared with the Zhang et al. (2016); the EDAK (Athmani et al., 2019), DKMS (Yousefpoor & Barati, 2020), SSEKMS (Kumar et al., 2021), and ADPK (Ahlawat & Dave, 2021) methods show the proposed method's better performance.
In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication.</description><identifier>ISSN: 1074-5351</identifier><identifier>EISSN: 1099-1131</identifier><identifier>DOI: 10.1002/dac.5076</identifier><language>eng</language><publisher>Chichester: Wiley Subscription Services, Inc</publisher><subject>authentication ; cryptography ; Data collection ; key management ; Nodes ; Radio equipment ; security ; Sensors ; Wireless networks ; wireless sensor network ; Wireless sensor networks</subject><ispartof>International journal of communication systems, 2022-04, Vol.35 (6), p.n/a</ispartof><rights>2021 John Wiley & Sons Ltd.</rights><rights>2022 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2936-fcb7430bb2791fe47ceea66e6d1bc664cf37f156cef9c11397b24c9083438f143</citedby><cites>FETCH-LOGICAL-c2936-fcb7430bb2791fe47ceea66e6d1bc664cf37f156cef9c11397b24c9083438f143</cites><orcidid>0000-0003-0028-3568 ; 0000-0001-5132-5540</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fdac.5076$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fdac.5076$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,776,780,1411,27903,27904,45553,45554</link.rule.ids></links><search><creatorcontrib>Alimoradi, Pourya</creatorcontrib><creatorcontrib>Barati, Ali</creatorcontrib><creatorcontrib>Barati, Hamid</creatorcontrib><title>A hierarchical key management and authentication method for wireless sensor networks</title><title>International journal of communication systems</title><description>Summary
In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these networks, maintaining security has always been one of the most critical challenges in wireless sensor networks. Key management is one of the methods used to maintain security in wireless sensor networks. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication. The performance of the proposed method is compared with the Zhang et al. (2016); the EDAK (Athmani et al., 2019), DKMS (Yousefpoor & Barati, 2020), SSEKMS (Kumar et al., 2021), and ADPK (Ahlawat & Dave, 2021) methods show the proposed method's better performance.
In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication.</description><subject>authentication</subject><subject>cryptography</subject><subject>Data collection</subject><subject>key management</subject><subject>Nodes</subject><subject>Radio equipment</subject><subject>security</subject><subject>Sensors</subject><subject>Wireless networks</subject><subject>wireless sensor network</subject><subject>Wireless sensor networks</subject><issn>1074-5351</issn><issn>1099-1131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp1kMFOwzAMhiMEEmMg8QiRuHDpSJo0aY7TYIA0ics4R2nq0G5tM5JO096ejHHl5N_yJ1v-ELqnZEYJyZ9qY2cFkeICTShRKqOU0ctTljwrWEGv0U2MG0JImYtigtZz3LQQTLBNa02Ht3DEvRnMF_QwjNgMNTb7sUk5jcfWD7iHsfE1dj7gQxuggxhxhCGmfoDx4MM23qIrZ7oId391ij6XL-vFW7b6eH1fzFeZzRUTmbOV5IxUVS4VdcClBTBCgKhpZYXg1jHpaCEsOGXTH0pWObeKlIyz0lHOpujhvHcX_Pce4qg3fh-GdFLngsmyJEqWiXo8Uzb4GAM4vQttb8JRU6JPznRypk_OEpqd0UPbwfFfTj_PF7_8D3AHbZ4</recordid><startdate>202204</startdate><enddate>202204</enddate><creator>Alimoradi, Pourya</creator><creator>Barati, Ali</creator><creator>Barati, Hamid</creator><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0003-0028-3568</orcidid><orcidid>https://orcid.org/0000-0001-5132-5540</orcidid></search><sort><creationdate>202204</creationdate><title>A hierarchical key management and authentication method for wireless sensor networks</title><author>Alimoradi, Pourya ; Barati, Ali ; Barati, Hamid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2936-fcb7430bb2791fe47ceea66e6d1bc664cf37f156cef9c11397b24c9083438f143</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>authentication</topic><topic>cryptography</topic><topic>Data collection</topic><topic>key management</topic><topic>Nodes</topic><topic>Radio equipment</topic><topic>security</topic><topic>Sensors</topic><topic>Wireless networks</topic><topic>wireless sensor network</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alimoradi, Pourya</creatorcontrib><creatorcontrib>Barati, Ali</creatorcontrib><creatorcontrib>Barati, Hamid</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>International journal of communication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alimoradi, Pourya</au><au>Barati, Ali</au><au>Barati, Hamid</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A hierarchical key management and authentication method for wireless sensor networks</atitle><jtitle>International journal of communication systems</jtitle><date>2022-04</date><risdate>2022</risdate><volume>35</volume><issue>6</issue><epage>n/a</epage><issn>1074-5351</issn><eissn>1099-1131</eissn><abstract>Summary
In wireless sensor networks, sensor nodes are typically distributed in harsh environments for continuous monitoring and data collection. All sensor nodes send the collected data directly or through other sensor nodes to the base station. Due to the nature and range of applications of these networks, maintaining security has always been one of the most critical challenges in wireless sensor networks. Key management is one of the methods used to maintain security in wireless sensor networks. In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication. The performance of the proposed method is compared with the Zhang et al. (2016); the EDAK (Athmani et al., 2019), DKMS (Yousefpoor & Barati, 2020), SSEKMS (Kumar et al., 2021), and ADPK (Ahlawat & Dave, 2021) methods show the proposed method's better performance.
In this paper, a hierarchical key management method for wireless sensor networks is presented. In the proposed method, first, the network is zoned, then the connection between the network nodes is established through two keys within the zone and between zones. The zone key is the shared key between the zone members and the zone manager. For intra‐zone communication, a lightweight authentication operation is performed between zone members and the zone manager. If the authentication operation is successful, the key generation process is performed within the zone. The inter‐zone key is shared between both of the manager nodes and is used for inter‐zone communication.</abstract><cop>Chichester</cop><pub>Wiley Subscription Services, Inc</pub><doi>10.1002/dac.5076</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-0028-3568</orcidid><orcidid>https://orcid.org/0000-0001-5132-5540</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1074-5351 |
ispartof | International journal of communication systems, 2022-04, Vol.35 (6), p.n/a |
issn | 1074-5351 1099-1131 |
language | eng |
recordid | cdi_proquest_journals_2637880978 |
source | Wiley-Blackwell Journals |
subjects | authentication cryptography Data collection key management Nodes Radio equipment security Sensors Wireless networks wireless sensor network Wireless sensor networks |
title | A hierarchical key management and authentication method for wireless sensor networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T19%3A13%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20hierarchical%20key%20management%20and%20authentication%20method%20for%20wireless%20sensor%20networks&rft.jtitle=International%20journal%20of%20communication%20systems&rft.au=Alimoradi,%20Pourya&rft.date=2022-04&rft.volume=35&rft.issue=6&rft.epage=n/a&rft.issn=1074-5351&rft.eissn=1099-1131&rft_id=info:doi/10.1002/dac.5076&rft_dat=%3Cproquest_cross%3E2637880978%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2637880978&rft_id=info:pmid/&rfr_iscdi=true |